OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: Joseph N. Mait
  • Vol. 53, Iss. 20 — Jul. 10, 2014
  • pp: 4539–4547

Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique

B. Deepan, C. Quan, Y. Wang, and C. J. Tay  »View Author Affiliations

Applied Optics, Vol. 53, Issue 20, pp. 4539-4547 (2014)

View Full Text Article

Enhanced HTML    Acrobat PDF (2364 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



In this paper, a new multiple-image encryption and decryption technique that utilizes the compressive sensing (CS) concept along with a double-random phase encryption (DRPE) has been proposed. The space multiplexing method is employed for integrating multiple-image data. The method, which results in a nonlinear encryption system, is able to overcome the vulnerability of classical DRPE. The CS technique and space multiplexing are able to provide additional key space in the proposed method. A numerical experiment of the proposed method is implemented and the results show that the proposed method has good accuracy and is more robust than classical DRPE. The proposed system is also employed against chosen-plaintext attacks and it is found that the inclusion of compressive sensing enhances robustness against the attacks.

© 2014 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.0100) Image processing : Image processing
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fiber Optics and Optical Communications

Original Manuscript: February 28, 2014
Revised Manuscript: May 25, 2014
Manuscript Accepted: May 28, 2014
Published: July 9, 2014

B. Deepan, C. Quan, Y. Wang, and C. J. Tay, "Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique," Appl. Opt. 53, 4539-4547 (2014)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994). [CrossRef]
  2. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  3. D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62–68 (1999). [CrossRef]
  4. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009). [CrossRef]
  5. A. Alfalou, C. Brosseau, N. Abdallah, and M. Jridi, “Simultaneous fusion, compression, and encryption of multiple images,” Opt. Express 19, 24023–24029 (2011). [CrossRef]
  6. I. Mehra and N. K. Nishchal, “Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding,” Opt. Express 22, 5474–5482 (2014). [CrossRef]
  7. I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images using two beam interference phenomenon,” Opt. Laser Technol. 60, 1–7 (2014). [CrossRef]
  8. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cipher text attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1666 (2005). [CrossRef]
  9. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007). [CrossRef]
  10. P. Kumar, J. Joseph, and K. Singh, “Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack,” J. Opt. 14, 045401 (2012). [CrossRef]
  11. P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Vulnerability of the security enhanced double random phase amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012). [CrossRef]
  12. X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014). [CrossRef]
  13. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008). [CrossRef]
  14. P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase function,” Opt. Lett. 34, 331–333 (2009). [CrossRef]
  15. E. Pérez-Cabré, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011). [CrossRef]
  16. W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013). [CrossRef]
  17. S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013). [CrossRef]
  18. Q. Gong, X. Liu, G. Li, and Y. Qin, “Multiple-image encryption and authentication with sparse representation by space multiplexing,” Appl. Opt. 52, 7486–7493 (2013). [CrossRef]
  19. E. Candès and M. Wakin, “An introduction to compressive sampling,” IEEE Signal Process Mag. 25(2), 21–30 (2008).
  20. E. Candès and J. Romberg, “Sparsity and incoherence in compressive sampling,” Inverse Probl. 23, 969–985 (2007). [CrossRef]
  21. R. Huang and K. Sakurai, “A robust and compression-combined digital image encryption method based on compressive sensing,” in Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) (IEEE, 2011, Vol. 53, pp. 105–108.
  22. P. Lu, Z. Xu, X. Lu, and X. Liu, “Digital image information encryption based on compressive sensing and double random-phase encoding technique,” Optik 124, 2514–2518 (2013). [CrossRef]
  23. X. Liu, Y. Cao, P. Lu, X. Lu, and Y. Li, “Optical image encryption technique based on compressed sensing and Arnold transformation,” Optik 124, 6590–6593 (2013). [CrossRef]
  24. S. Becker, J. Bobin, and E. Candès, “NESTA: a fast and accurate first-order method for sparse recovery,” SIAM J. Imaging Sci. 4, 1–39 (2011). [CrossRef]
  25. Y. Nesterov, “Smooth minimization of non-smooth functions,” Math. Program. 103, 127–152 (2005). [CrossRef]
  26. Y. Rivenson, A. Stern, and B. Javidi, “Single exposure super-resolution compressive imaging by double random phase encoding,” Opt. Express 18, 15094–15103 (2010). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited